Improper Access Control Affecting org.apache.cxf:cxf-rt-rs-security-sso-oidc package, versions [3.3.0,3.3.4)[3.2.0,3.2.11)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
1.94% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHECXF-480440
  • published6 Nov 2019
  • disclosed6 Nov 2019
  • creditUnknown

Introduced: 6 Nov 2019

CVE-2019-12419  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade org.apache.cxf:cxf-rt-rs-security-sso-oidc to version 3.3.4, 3.2.11 or higher.

Overview

org.apache.cxf:cxf-rt-rs-security-sso-oidc is an Apache CXF Runtime OpenId Connect library.

Affected versions of this package are vulnerable to Improper Access Control. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.

CVSS Scores

version 3.1